Font Size: a A A

Research And Computer Simulation Based On BB84 Quantum Cryptograph

Posted on:2005-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y XiaoFull Text:PDF
GTID:2168360122990564Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Communication technology has been made a great progress with the development of relative hardware and theories. People attach their must attentions to the security and secrecy during the information transmitting. It is one of the key communication technologies on the aspects how to connect accurately the either sides or multi-sides in the communication and assure the information transmission to be secure and secret.In this paper, the author, under the full grasp of status of quantum cryptographic key research, does research concentrating on the BB84 quantum cryptographic key distribution protocol. The quantum communication can be divided into two stages: In the first stage, the quantum communication is conducted and cryptographic key communication is finished through the quantum channel; In the second stage, the negotiation of cryptographic key is achieved in order to measure whether any bug exists or not, and then confirms the final cryptographic key, at this time the quantum communication is accomplished. The termless security of quantum cryptographic key protocol is based on the Quantum Non-clone principle and Heisenberg Uncertainty principle. Whilst, these two characteristics mentioned above contributes greatly to solve the problems of low transmitting rate, complicated operation and forge-identity assault in the BB84 protocol.According to such existing problems, the author of this paper presents an innovated project named as BB84+ quantum cryptographic key distribution protocol, which is to make some improvement on the base of the original module. Its key idea of this project is to balance the transmitting efficiency and the transmitting cryptograph. Concerning about the actual application, this project is a compromising method to enhance the transmitting efficiency with the sacrifice of decreasing the degree of cryptograph under the condition that the security is assured in actual application. On the whole, BB84+ quantum cryptographic key distribution project is far from a termless absolute secure one in the perspectiveof theory, because the efficiency is enhanced on the sacrifice of security decreased. What's more, some works are done to strengthen the cryptograph in the field of identity authentication and other sectors, and the enhancement of efficiency strongly supports the cryptograph. From this point, it can be said that the balance between the popularization of application and security is anchored at. To some extent, the problem of low efficiency in actual application is solved and a new method and a new research view are provided.Finally, the author of this paper prepares the relative work that should be done in relation to the computer simulation based on the BB84+ protocol. Then the BB84+ protocol may be divided into three parts: identity clarification, cryptographic distribution and noises simulation, and consequently the author illustrates the detail of some parts and presents the program chats.
Keywords/Search Tags:Quantum Cryptograph, Quantum Key Distribution, BB84 Protocol, Transmitting Efficiency, Hinesburg's Uncertainty Principle, Quantum Non-clone principle, Identity authentication
PDF Full Text Request
Related items